CVE-2025-71095
Gravedad CVSS v3.1:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
13/01/2026
Última modificación:
25/03/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: stmmac: fix the crash issue for zero copy XDP_TX action<br />
<br />
There is a crash issue when running zero copy XDP_TX action, the crash<br />
log is shown below.<br />
<br />
[ 216.122464] Unable to handle kernel paging request at virtual address fffeffff80000000<br />
[ 216.187524] Internal error: Oops: 0000000096000144 [#1] SMP<br />
[ 216.301694] Call trace:<br />
[ 216.304130] dcache_clean_poc+0x20/0x38 (P)<br />
[ 216.308308] __dma_sync_single_for_device+0x1bc/0x1e0<br />
[ 216.313351] stmmac_xdp_xmit_xdpf+0x354/0x400<br />
[ 216.317701] __stmmac_xdp_run_prog+0x164/0x368<br />
[ 216.322139] stmmac_napi_poll_rxtx+0xba8/0xf00<br />
[ 216.326576] __napi_poll+0x40/0x218<br />
[ 216.408054] Kernel panic - not syncing: Oops: Fatal exception in interrupt<br />
<br />
For XDP_TX action, the xdp_buff is converted to xdp_frame by<br />
xdp_convert_buff_to_frame(). The memory type of the resulting xdp_frame<br />
depends on the memory type of the xdp_buff. For page pool based xdp_buff<br />
it produces xdp_frame with memory type MEM_TYPE_PAGE_POOL. For zero copy<br />
XSK pool based xdp_buff it produces xdp_frame with memory type<br />
MEM_TYPE_PAGE_ORDER0. However, stmmac_xdp_xmit_back() does not check the<br />
memory type and always uses the page pool type, this leads to invalid<br />
mappings and causes the crash. Therefore, check the xdp_buff memory type<br />
in stmmac_xdp_xmit_back() to fix this issue.
Impacto
Puntuación base 3.x
5.50
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.13.1 (incluyendo) | 6.1.160 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (incluyendo) | 6.6.120 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (incluyendo) | 6.12.64 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (incluyendo) | 6.18.4 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:5.13:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc8:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/3f7823219407f2f18044c2b72366a48810c5c821
- https://git.kernel.org/stable/c/45ee0462b88396a0bd1df1991f801c89994ea72b
- https://git.kernel.org/stable/c/4d0ceb7677e1c4616afb96abb4518f70b65abb0d
- https://git.kernel.org/stable/c/5e5988736a95b1de7f91b10ac2575454b70e4897
- https://git.kernel.org/stable/c/a48e232210009be50591fdea8ba7c07b0f566a13



